General
-
Target
87f02f971e6c0925f36b48912eee5df4_JaffaCakes118
-
Size
273KB
-
Sample
241102-1mr9qswfnb
-
MD5
87f02f971e6c0925f36b48912eee5df4
-
SHA1
30be3fb266531e04d22d92cc4034a0b0380bfaeb
-
SHA256
d8e1d628d41a7ec46b1fd2c68be1ae3eb8a43ea63a6820ea28bb8b746ec8ff6d
-
SHA512
dc92861f8d69b4679987c0778b316841ffbbcafc90de434d1cebb6f2b8d085e16bb0a696bed60ee5defa75dbf890aa1782c8bb296727b2d7c50ac21669127993
-
SSDEEP
6144:ahfANY9etDofluVdSCfVicJPm6l+CSRg3qvofm2evUEeyMb:qIrHTTNm4+3Rg3BmBvSb
Static task
static1
Behavioral task
behavioral1
Sample
87f02f971e6c0925f36b48912eee5df4_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
darkcomet
Guest16
mile404.no-ip.info:1604
DC_MUTEX-U6BQSZ0
-
InstallPath
System\taskhost.exe
-
gencode
MoHQLCL0MMAD
-
install
true
-
offline_keylogger
true
-
password
Funnel5266
-
persistence
false
-
reg_key
taskhost
Targets
-
-
Target
87f02f971e6c0925f36b48912eee5df4_JaffaCakes118
-
Size
273KB
-
MD5
87f02f971e6c0925f36b48912eee5df4
-
SHA1
30be3fb266531e04d22d92cc4034a0b0380bfaeb
-
SHA256
d8e1d628d41a7ec46b1fd2c68be1ae3eb8a43ea63a6820ea28bb8b746ec8ff6d
-
SHA512
dc92861f8d69b4679987c0778b316841ffbbcafc90de434d1cebb6f2b8d085e16bb0a696bed60ee5defa75dbf890aa1782c8bb296727b2d7c50ac21669127993
-
SSDEEP
6144:ahfANY9etDofluVdSCfVicJPm6l+CSRg3qvofm2evUEeyMb:qIrHTTNm4+3Rg3BmBvSb
-
Darkcomet family
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1